Remove Android Phone Virus And Protect Your Device Against It

How Your Device can Be Infected & Protected Against Android Viruses

Android Viruses isn’t a topic which many people discuss in my locality but there has really been complaints which some people I had met were not even able to describe. Picking up their devices I discovered they had been attacked by one form of virus or the other, that’s why I had to bring us this walk-through.

Around October 2013, Viruses were released which affected some users of the Operating System. Well, these mostly included malwares, Trojans and few others which I’ll be explaining later in this post.
A Brief Description of Android Viruses

Just like every other virus that can attack your computer systems, Android viruses are malicious apps, programs, files or even codes that can mess up your device and perhaps in most cases do things in your device without your consent, like stealing your data and/or destroying it.

They surely can do more harm to more devices despite the huge amount of effort Google puts into building Android OS. Many of us believe our Android devices are invulnerable but the OS is Open source (Android Open Source Project -AOSP), this alone completely changes that fact.
Android Virus Types

They are mainly Malwares and Trojans right now, they’re made up of files & codes, yes you heard me right “CODES”! Viruses are now written in strong encrypted codes and injected to run in your device, we take a sneak peak at Trojans & Malwares.
Malwares

Malwares can completely hijack installed apps with your data or even the entire device. This virus that use the WebView component on Android versions older than 4.4 (KitKat) are silent and transparent, it won’t notify you before taking actions.

Malwares make use of certificates to gain access to your device, Android certs which give administrative rights are basically of 3 types

1. Hard-coded Adobe certificate

2. The 3LM certificate with the certificate chain, malwares can use the device management extensions to silently install new apps, change system settings and take control of the device.

3. The third is hard-coded certificate is used by Google Wallet

Attackers abuse and can use any of the above certs to bypass whatever stops malwares from attacking your device.

Okay, this one is pretty smart amongst the rest. If a trojan infects your device, it can relax there without you even noticing, it’s the most sophisticated virus you can think of.

This was the first malicious program classified as a Trojan SMS that affects smartphones running on Google’s Android operating system, and which had already infected a number of mobile devices, sending SMS messages to premium rate numbers without the owner’s knowledge or consent, and accumulating huge bills“

Another dreadful feature of a Trojan is that it can’t be deleted once it’s installed. This is because Trojan enjoys extended privileges, but is not listed as an application with Device Administrator privileges.

Trojans can go as Far as collecting sensitive data from your device and these may include: your MAC address, telephone number, account balance, local time and of course it will tell the cybercriminals whether it had successfully gained Administrator privileges of your device.

Now there were still apps submitted to Google and Kaspersky team for Analysis, they returned feedbacks after scanning– trojans make use of a program called “Backdoor.AndroidOS.Obad.a.”

I believe more crafty ways are still been built to encrypt Trojans with codes that cannot be understandable by anti-malware experts. The fight against this virus continues.
How Your Android Devices can Be Infected

Your device can be infected through any means of communication with a 3rd-party device, app, files, or bytes it received.

In most cases those free apps you install from 3rd party stores other than the original Google PlayStore can contain malicious codes.

You may even get your device infected through mails/messages attachments, or shared apps from another devices.Tips on how to protect your device

Fortunately, in most cases of reported issues of Android malware & trojan attacks, solutions were quickly created to fight it. Here’s what you can do in case your smartphone or tablet is already infected:
1. Install an ANTI-VIRUS

Installing an antivirus can’t be overemphasized. Although this does not guarantee your device is 100 secure, it goes a long way to prevent an infection. You may pick from any of those below, they’re reliable.

- Kaspersky Internet Security

- AVAST Mobile Security & Antivirus

There are more which you can always find from recommendation by Play Store.

You’re expected to install only one AntiVirus! Installing more than one can actually harm your device sooner or later. Wondering why? Installing two different programs to perform the same jab can cause conflicts with undesirable effects like your device crashing or slowing down.

I’ll suggest you also install Bluebox Security Scanner, it can check whether a device is vulnerable to the fake ID attacks and whether your device allows installation of apps from untrusted sources among other things.
2. Monitor Your Installation Permissions & Accessibility

Before installing apps, you’re always presented with the permissions the app is asking for. This is an easy way to spot malicious programs. When apps starts asking for permissions like your contacts, device app history, location, identity, SMS access, email access and other sensitive data, be sure it’s an app you trust downloaded preferably from Google Play.This includes

You can also choose to VERIFY APPS before you install them.
3. Encrypt your phone

With this settings activated, you should make yourself a numeric PIN or Password to decrypt your phone each you Power it on. You do this by going to SETTINGS > SECURITY > scroll down and you’ll find the option.

Be sure you use a PIN/Password you can easily remember.

People feel Android virus attacks are few but it mustn’t be ignored, otherwise you may loose not only your device, but also your accounts connected with it. Apps like PayPal, GoogleWallet, BitCoin can get hacked through viruses. I still can’t tell which viruses are more harmful, but I’m pretty sure the tips in this post will help you stay safe from any of them.